A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis
☆43May 18, 2017Updated 8 years ago
Alternatives and similar repositories for malwareSandbox
Users that are interested in malwareSandbox are comparing it to the libraries listed below
Sorting:
- Exploit using barcodes, QRcodes, earn13, datamatrix☆116Apr 15, 2016Updated 9 years ago
- Some useful tools and scripts☆47Feb 11, 2023Updated 3 years ago
- An Online Analysis System for Packed Android Malware☆107Jul 28, 2016Updated 9 years ago
- Yet another Android Dex bytecode Disassembler: a static Android app disassembler for fast class and method signature extraction and code …☆30Dec 15, 2018Updated 7 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆21Mar 30, 2018Updated 7 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/malwarecookbook☆42May 25, 2015Updated 10 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- The first open source vulnerability scanner for firmwares☆197Jul 18, 2016Updated 9 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- ARM Shellcode Generator☆105Aug 26, 2017Updated 8 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Windows PowerShell domain scanning tool☆54Apr 23, 2016Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- ☆24Sep 26, 2017Updated 8 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 4 months ago
- ☆12Oct 12, 2013Updated 12 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- HackerOne Public Disclosure Slack Bot☆20Sep 19, 2022Updated 3 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112May 7, 2015Updated 10 years ago
- The pyspresso package is a Python-based framework for debugging Java.☆51Jun 17, 2016Updated 9 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year